This is the output from the SSH (Putty):
Unfortunately, I have to cut the output in 2 parts due to forum limitations.
~ # curl -vL https://os-artifacts.home-assistant.io/13.1/haos_ova-13.1.raucb -O
/dev/null
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Host os-artifacts.home-assistant.io:443 was resolved.
* IPv6: 2606:4700:20::ac43:445a, 2606:4700:20::681a:5ee, 2606:4700:20::681a:4ee
* IPv4: 104.26.4.238, 104.26.5.238, 172.67.68.90
* Trying 104.26.4.238:443...
* Connected to os-artifacts.home-assistant.io (104.26.4.238) port 443
* ALPN: curl offers h2,http/1.1
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [19 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [2318 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [80 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / id-ecPublicKe y
* ALPN: server accepted h2
* Server certificate:
* subject: C=US; ST=California; L=San Francisco; O=Cloudflare, Inc.; CN=os-arti facts.home-assistant.io
* start date: Sep 28 00:00:00 2023 GMT
* expire date: Sep 26 23:59:59 2024 GMT
* subjectAltName: host "os-artifacts.home-assistant.io" matched cert's "os-arti facts.home-assistant.io"
* issuer: C=US; O=Cloudflare, Inc.; CN=Cloudflare Inc ECC CA-3
* SSL certificate verify ok.
* Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), s igned using ecdsa-with-SHA256
* Certificate level 1: Public key type EC/prime256v1 (256/128 Bits/secBits), s igned using sha256WithRSAEncryption
* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed usi ng sha1WithRSAEncryption
} [5 bytes data]
* using HTTP/2
* [HTTP/2] [1] OPENED stream for https://os-artifacts.home-assistant.io/13.1/hao s_ova-13.1.raucb
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: os-artifacts.home-assistant.io]
* [HTTP/2] [1] [:path: /13.1/haos_ova-13.1.raucb]
* [HTTP/2] [1] [user-agent: curl/8.7.1]
* [HTTP/2] [1] [accept: */*]
} [5 bytes data]
> GET /13.1/haos_ova-13.1.raucb HTTP/2
> Host: os-artifacts.home-assistant.io
> User-Agent: curl/8.7.1
> Accept: */*
>
* Request completely sent off
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [230 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [230 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
< HTTP/2 302
< date: Tue, 03 Sep 2024 18:53:20 GMT
< content-type: text/html
< content-length: 143
< location: https://github.com/home-assistant/operating-system/releases/download /13.1/haos_ova-13.1.raucb
< cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-c heck=0, pre-check=0
< expires: Thu, 01 Jan 1970 00:00:01 GMT
< report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s= %2FYKO0TQVwCd66XnIAFoSmQAFjTBJNLAs7i5A3bOfLlYE7jn5st8ziO%2FVUgEX6OQdvtD1DR58mYlD pXoN%2Bq7Ep8R%2F51xYU6AHvBQ2bGw0cUDmvEbPhfGm5hRTaNo%2FB9JRCwWU23gADAE7m3YwMkJS4Q %3D%3D"}],"group":"cf-nel","max_age":604800}
< nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
< server: cloudflare
< cf-ray: 8bd7f1293aefb8b4-AMS
< alt-svc: h3=":443"; ma=86400
<
* Ignoring the response-body
{ [5 bytes data]
100 143 100 143 0 0 2347 0 --:--:-- --:--:-- --:--:-- 2383
* Connection #0 to host os-artifacts.home-assistant.io left intact
* Issue another request to this URL: 'https://github.com/home-assistant/operatin g-system/releases/download/13.1/haos_ova-13.1.raucb'
* Host github.com:443 was resolved.
* IPv6: (none)
* IPv4: 140.82.121.3
* Trying 140.82.121.3:443...
* Connected to github.com (140.82.121.3) port 443
* ALPN: curl offers h2,http/1.1
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [19 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [3137 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [80 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [36 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [36 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / id-ecPublicKe y
* ALPN: server accepted h2
* Server certificate:
* subject: CN=github.com
* start date: Mar 7 00:00:00 2024 GMT
* expire date: Mar 7 23:59:59 2025 GMT
* subjectAltName: host "github.com" matched cert's "github.com"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo ECC Domain Validation Secure Server CA
* SSL certificate verify ok.
* Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), s igned using ecdsa-with-SHA256
* Certificate level 1: Public key type EC/prime256v1 (256/128 Bits/secBits), s igned using ecdsa-with-SHA384
* Certificate level 2: Public key type EC/secp384r1 (384/192 Bits/secBits), si gned using ecdsa-with-SHA384
} [5 bytes data]
* using HTTP/2
* [HTTP/2] [1] OPENED stream for https://github.com/home-assistant/operating-sys tem/releases/download/13.1/haos_ova-13.1.raucb
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: github.com]
* [HTTP/2] [1] [:path: /home-assistant/operating-system/releases/download/13.1/h aos_ova-13.1.raucb]
* [HTTP/2] [1] [user-agent: curl/8.7.1]
* [HTTP/2] [1] [accept: */*]
} [5 bytes data]
> GET /home-assistant/operating-system/releases/download/13.1/haos_ova-13.1.rauc b HTTP/2
> Host: github.com
> User-Agent: curl/8.7.1
> Accept: */*
>
* Request completely sent off
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
< HTTP/2 302
< server: GitHub.com
< date: Tue, 03 Sep 2024 18:53:20 GMT
< content-type: text/html; charset=utf-8
< vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Acc ept, X-Requested-With
< location: https://objects.githubusercontent.com/github-production-release-asse t-2e65be/115992009/cab09048-b8d6-414e-9faa-4f3a766db1e4?X-Amz-Algorithm=AWS4-HMA C-SHA256&X-Amz-Credential=releaseassetproduction%2F20240903%2Fus-east-1%2Fs3%2Fa ws4_request&X-Amz-Date=20240903T185320Z&X-Amz-Expires=300&X-Amz-Signature=74bd85 5fc1fa2550f2fa1939e87f5fde6c89698faeb9c1dd680960f2b7bb8c0c&X-Amz-SignedHeaders=h ost&actor_id=0&key_id=0&repo_id=115992009&response-content-disposition=attachmen t%3B%20filename%3Dhaos_ova-13.1.raucb&response-content-type=application%2Foctet- stream
< cache-control: no-cache
< strict-transport-security: max-age=31536000; includeSubdomains; preload
< x-frame-options: deny
< x-content-type-options: nosniff
< x-xss-protection: 0
< referrer-policy: no-referrer-when-downgrade
{ [5 bytes data]